Name: Grant Hernandez
Type: User
Bio: Cyber security focused programmer. Interested in binary exploitation, reverse enginering, fuzzing, and circuit board design.
Twitter: @digital_cold
Twitter: digital_cold
Location: USA
Blog: https://hernan.de/z
Grant Hernandez's Projects
Tool for extracting information from newly spawned processes
A tool to triage crashing input files with a debugger.
The next-generation binary analysis platform from UC Santa Barbara's Seclab!
Documentation for the angr suite
Python core of avatar²
My implementation of an AVL tree in C++. Created for a class at UF.
A curated list of awesome baseband research resources
A personal collection of x86 assembly snippets for learning and performance tests.
My submission for the Build it Break it Fix 2014 competition.
This project contains the source code for the CERT Basic Fuzzing Framework (BFF) and the CERT Failure Observation Engine (FOE).
A sampling of CTF solutions from me over the years.
A tool for CTF organizers to help automate the management of challenge creation repositories on GitHub.
CTFs as you need them
Generate secure passphrases with the Diceware method
Grant Hernandez's personal dotfiles.
Binary code coverage visualizer plugin for Ghidra
File Fuzzing For Fun (FFFF). A bare minimum file format fuzzer. Easily extensible corruption types.
A simple webpage to Slack extraction bot for UF's Arredondo Café.
A quick-n-dirty fractal viewer written in good-ol' C and SDL.
An assorted collection of GDB scripts.
Some C++ graphics fun
Ghidra is a software reverse engineering (SRE) framework
Homebrew forumula for Linux usbutils.
Notes and tools to send and receive signals from Hunter fan remote controls.
A fast, small, safe, gradually typed embeddable scripting language derived from Lua